In case you missed (the forum has been pretty quiet about this one), CVE-2020-4273 had an update yesterday:
https://www.ibm.com/support/pages/node/6151701?myns=s033&mynp=OCSTXKQY&mync=E&cm_sp=s033-_-OCSTXKQY-_-E If you can't do the upgrade now, at least apply the mitigation to the client nodes generally exposed to unprivileged users: Check the setuid bit: ls -l /usr/lpp/mmfs/bin | grep r-s | awk '{system("ls -l /usr/lpp/mmfs/bin/"$9)}') Apply the mitigation: ls -l /usr/lpp/mmfs/bin | grep r-s | awk '{system("chmod u-s /usr/lpp/mmfs/bin/"$9)}' Verification: ls -l /usr/lpp/mmfs/bin | grep r-s | awk '{system("ls -l /usr/lpp/mmfs/bin/"$9)}') All the best Jaime . . . ************************************ TELL US ABOUT YOUR SUCCESS STORIES http://www.scinethpc.ca/testimonials ************************************ --- Jaime Pinto - Storage Analyst SciNet HPC Consortium - Compute/Calcul Canada www.scinet.utoronto.ca - www.computecanada.ca University of Toronto 661 University Ave. (MaRS), Suite 1140 Toronto, ON, M5G1M1 P: 416-978-2755 C: 416-505-1477 _______________________________________________ gpfsug-discuss mailing list gpfsug-discuss at spectrumscale.org http://gpfsug.org/mailman/listinfo/gpfsug-discuss
